CVE-2024-7774

CRITICAL

Langchain.js < 0.2.19 - Path Traversal

Title source: rule
STIX 2.1

Description

A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.

Scores

CVSS v3 9.1
EPSS 0.0060
EPSS Percentile 69.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-29 CWE-22
Status published
Products (2)
langchain/langchain.js 0.2.5
npm/langchain 0 - 0.2.19npm
Published Oct 29, 2024
Tracked Since Feb 18, 2026